USN-3692-2: OpenSSL vulnerabilities
26 June 2018
Several security issues were fixed in OpenSSL.
Releases
Packages
- openssl - Secure Socket Layer (SSL) cryptographic library and tools
Details
USN-3692-1 fixed a vulnerability in OpenSSL. This update provides
the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
Keegan Ryan discovered that OpenSSL incorrectly handled ECDSA key
generation. An attacker could possibly use this issue to perform a
cache-timing attack and recover private ECDSA keys. (CVE-2018-0495)
Guido Vranken discovered that OpenSSL incorrectly handled very large prime
values during a key agreement. A remote attacker could possibly use this
issue to consume resources, leading to a denial of service. (CVE-2018-0732)
Alejandro Cabrera Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis
Manuel Alvarez Tapia discovered that OpenSSL incorrectly handled RSA key
generation. An attacker could possibly use this issue to perform a
cache-timing attack and recover private RSA keys. (CVE-2018-0737)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-3692-1: openssl1.0, libssl1.0.0-udeb, openssl, libssl-doc, libcrypto1.0.0-udeb, libssl1.0.0, libssl1.1-udeb, libcrypto1.1-udeb, libssl-dev, libssl1.1, libssl1.0-dev
- USN-3689-2: libgcrypt11
- USN-3689-1: libgcrypt20-dev, libgcrypt20, libgcrypt20-doc, libgcrypt11-doc, libgcrypt20-udeb, libgcrypt-mingw-w64-dev, libgcrypt11, libgcrypt11-udeb, libgcrypt11-dev
- USN-3850-1: libnss3-1d, nss, libnss3, libnss3-tools, libnss3-nssdb, libnss3-dev
- USN-3850-2: nss, libnss3
- USN-3628-1: libssl1.0.0-udeb, openssl, libssl-doc, libssl1.0.0, libcrypto1.0.0-udeb, libssl-dev
- USN-3628-2: openssl, libssl1.0.0